Great product!
November 11, 2021

Great product!

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Targeted Attack Protection for Email

Currently, at my organization, Proofpoint Target Attack Protection, also known as TAP, is used by the SOC and also our Threat Intelligence team. The SOC uses it by researching emails that they get alerted on, and the cyber threat intelligence team uses it to research campaigns that target our organization.
  • Details on specific malicious email campaigns
  • Details on the users that are targeted by those campaigns
  • Use of API's to be used with other cyber tools your company has
  • Insight on the types of malware and types of campaigns
  • Better user import capabilities
  • MITRE alignment
  • Stronger campaign capture
  • Campaign tracking
  • Whaling
  • Department targeting
This is the first product of its kind that I've used personally. The last 3 companies that I worked for also used Proofpoint, which includes Proofpoint Targeted Attack Protection, so I don't have a way to really compare it. I have seen that it is a leader in the industry.

Do you think Proofpoint Targeted Attack Protection (TAP) delivers good value for the price?

Yes

Are you happy with Proofpoint Targeted Attack Protection (TAP)'s feature set?

Yes

Did Proofpoint Targeted Attack Protection (TAP) live up to sales and marketing promises?

Yes

Did implementation of Proofpoint Targeted Attack Protection (TAP) go as expected?

Yes

Would you buy Proofpoint Targeted Attack Protection (TAP) again?

Yes

I think it is well suited for any organization. It truly gives good insight on the email campaigns that are hitting your company, as well as the people that are being targeted the most and also VIP users such as executives or even other people in IT, cyber, or administrators.

Proofpoint Targeted Attack Protection (TAP) Feature Ratings